The ITAT Ahmedabad deleted a Rs.1.02 crore addition made under Section 68, rejecting the AO’s claim that a loan was an accommodation entry. The Tribunal ruled the loan was a genuine business transaction, used specifically for repaying an existing business loan, establishing the required nexus and purpose.
ITAT analyzes the conflict between IBC’s asset protection and PMLA’s confiscation power. Attachment must cease post-resolution plan, and the IBBI circular offers a path for asset restoration.
Learn to file MCA AOC-4 on the V3 portal. The process requires direct online data entry for Balance Sheet and P&L figures, followed by DSC affixation and fee payment.
Comparison of Old vs. Default Tax Regimes (Sec 115BAC) for salaried income. Covers tax slabs, Standard Deduction, and Surcharge rates. Details the trade-off: reduced tax rates under Default Regime vs. forfeited exemptions like HRA, LTA, and 80C deductions.
Andhra Pradesh High Court set aside a GST order lacking a Document Identification Number, citing Supreme Court and CBIC circular precedents.
Overview of income tax rules for compulsory land acquisition: capital gains are taxed upon initial compensation receipt (Sec 45(5)), with enhanced compensation taxed separately. Covers TDS rules (Sec 194LA) at 10%, thresholds, and penalties for non-compliance.
The CIT(A) deleted a ₹ 75.5 lakh addition under Section 68 after finding the AO violated natural justice by denying cross-examination of the third-party who provided the statement. The ITAT accepted the reassessment was correctly initiated under Section 147, but the final ruling on the Revenue’s appeal is incomplete.
The Tribunal dismissed the assessee’s appeal, confirming that opting for Section 115BAA overrides the 20% LTCG rate under Section 112.
Effective April 1, 2026, the statutory limit for correcting TDS/TCS returns is 2 years from the FY end. This new rule eliminates unlimited revisions, demanding timely compliance to avoid penalties and blocked refunds.
Generative AI fuels sophisticated frauds in India, including deepfake impersonation and smart phishing. Organizations must adopt layered defenses and AI-augmented security to counter evolving threats.